results
Q: Question in the picture below.
A: Vectors are known as dynamic arrays with the ability to resize itself automatically when an element ...
Q: Acme Parts runs a small factory and employs workers who are paid one of three hourly rates depending...
A: import java.util.Scanner;public class AcmePay{ public static void main(String[] args)throws Exceptio...
Q: 3. Is the following true or false? Use a truth table to prove your answer. AB + AC = AC + B C
A: The correct answer is true Boolean algebra's basic principle is to solve logical mathematical diffic...
Q: List down the importance of CMM and briefly define one KPA from level 2, one from level 3 and one fr...
A: CMM : Cmm stands for capability maturity model in software project management. It was developed by ...
Q: c++ program : the program will be able to show how many words in the file.txt. And be able to show...
A: using System; public class CountWordFile { public static void M...
Q: (Assembly) The essential part of the RTL for BR is: SP <- SP + 2 PC <- Oprnd PC <-...
A: Explanation : RTL means Register Transfer Language In RTL, program counter (PC) is an essential p...
Q: Is it possible to store semi structured data in RDBMS and in Hbase ? If it is “No”, then give prope...
A: Semi-structured data The data which does not conforms to a data model but has some structure. It la...
Q: A derived class... a. Can contain more attributes (data members) and behaviors (methods) than its ba...
A: a,b,d only.
Q: PYTHON PROGRAMMING Implement the following:Given:food1 = 'Salad'food2 = 'Sandwich'price1=3.6price2=4...
A: The value can be displayed to 2 decimals by writhing %.2f specify the width in format
Q: this is python programming Create a function based on the following information: There is a list w...
A: EXPLANATION: - Function flat_list: - This function takes the nested list as an input parameter and ...
Q: 1. Which of the following is NOT an output device? a. Camera b. Printer С. Screen d. Speakers
A: Input devices are part of the I/O component of the computer system and these devices can receive dat...
Q: (i) What is the content of the matrix Need? Is the system in a safe state? If yes, indicate the poss...
A: Solution processes = 5 (p0,p1,p2 ,p3 ,p4) 3 resources A,,B,C A(instance 4) B(instance 2) C(instanc...
Q: Consider the following class Date, which represents a date using three ints for month, day and year:...
A: The program is written in C++ The code for bool operator==(Date) is: bool operator ==(const Dat...
Q: Please help with all aspects of the question: Describe how you would create a Java program that pro...
A: import java.util.*; import java.lang.*; public class Test{ public static void main(String args[]){ S...
Q: Why Is It necessary for the stream Insertion (operator>) functions to return a reference to ostream ...
A: C++ is able to input and output the built-in data types using the stream extraction operator >>...
Q: Design a class that holds the following personal data: name, address, age, and phone number. Write a...
A: Detail Explanation with code IT is class holds all personal details it has all getter and setter an...
Q: PHP supports overwriting parent functions. True or false?
A: Justification: Once the function is in the PHP function scope, the programmer can’t overwrite a fun...
Q: The assembly level had to be invented before the operating system level True or False?
A: The Assembly language is involved in the development of operating system(OS), but without its presen...
Q: Consider a hash table of capacity 4 that uses open addressing with linear probing. This hash table u...
A: a)ANS:INDEX 1 Given hash table capacity is 4 ,apple & cherry are inserted Hash code for "apple":...
Q: Write a class named Car that has the following member variables: Year: An int that holds the cars ye...
A: Before going into these program let us know some valid definition's Class It is nothing but bluepri...
Q: Explain four types of integrity controls for input forms. Which have you seen most frequently? Why a...
A: Integrity controls are processes and procedures incorporated into a framework for protecting the sys...
Q: Please check the image for the question and please provide explanation and comments : an example r...
A: The program is written in java. MAXLOOPS is set to 20
Q: Explain three different image transformation techniques used in Digital Image processing with exampl...
A: Solution Digital image processing system Digital image processing in computer science uses algorith...
Q: Write a C program, which reads a list of student recordsfrom a file in batch mode. Each student reco...
A: Code : #include <stdio.h>#include <string.h>#include <stdlib.h>char* cpy_str(char ...
Q: can you plz write in java.util.scanner form and can you make so i can copy and past it
A: The required C++ code is: #include<iostream>#include <cstdlib>#include<iomanip>#in...
Q: Bit strings of length 12 are generated randomly, find: The nu...
A:
Q: There is a concept of "modern C++" which is generally considered to be the C++ language since the C+...
A: C++ has arisen since 2011 as a complex, ever-changing language for which many people hope. Don't ge...
Q: The language for the question is C++
A: As you have submitted multiple question we will solve the first one for you if you want any specific...
Q: x86 processor is a RISC computer True or False?
A: The statement x86 processor is a RISC computer is False answer is False x86 processor is a CISC comp...
Q: Consider the following C++ code: class Player { private: string ID; string name; public: ...
A: Option B is correct answer.
Q: Write a function that takes a dictionary representing points in 3D space and an associated color for...
A: Program: # method to find centroid def centroid(dict1): dictRes={} #traverse the dictionary ...
Q: A pep9 call will push the return address onto the stack True or False?
A: Answer: pep9 CALL instruction calls a procedure and pushes the offset of the next instruction on the...
Q: Which best describes the meaning of a 1 (true) being output? Assume v is a large vector of ints. uns...
A: last value is negative
Q: Use the given database to output the results of the following SQL queries: b.) SELECT ∗FROM course A...
A: INTRODUCTION: A database consisting of several tables (such as COURSE, DEPARTMENT, INSTRUCTOR) are p...
Q: Discuss at length the measurement of the time and space consumed by an algorithm in order to determi...
A: Efficiency of a algorithm is nothing but the average execution time taken for a algorithm. There ar...
Q: Design a class that holds the following personal data: name, address, age, and phone number. Write a...
A: Psuedocode is a simple and plain language that uses structural conventions which is human friendly....
Q: python question Implement the following:1) Write a function dropLowest() with one parameter n.2) n ...
A: def dropLowest(n): indexOfLowest = n.index(min(n)) n.remove(n[indexOfLowest]) return n#call...
Q: In C++, write a program that reads in an array of type int. You may assume that there are fewer than...
A: #include <iostream>#include <vector>using namespace std; void countFreq(int arr[], int n...
Q: After graduating from University, Jerry and Samantha decide to go into business for themselves. They...
A: The word "ethical risk" refers to the unforeseen negative results of non-ethical behavior. A good e...
After graduating from University, Jerry and Samantha decide to go into business for themselves. They both love cooking, so they opened a mobile food truck. The new business is called SweetHand™ Almost immediately, their business takes off and there are long lines throughout the day and into the night.
Five years have passed, and SweetHand™ has grown to over 100 locations spread across the Caribbean. For the most part, these locations operate independently. This results in coordination problems and inefficient
supplies procurement. As a remedy, the IT manager has proposed linking all locations in telecommunications network.
What network topology choices are available, and which would you recommend?
Step by step
Solved in 2 steps
- Red Star Nationwide Insurance (RSNI) is a health insurance company that provides service to the hospitals national-wide. RSNI has five branches /centers in the USA. Please see the main parameter of RSNI company in the given diagram. QUESTION 1 Select only one center and answer the following questions Your center /branch name: List the IT Assets in that particular center. List of possible targets in your IT system. And, order your IT Assets by their importance. Place the most important IT asset on the top of the list for your center. QUESTION 2 List all cybersecurity threats that "your RSNI center” might encounter. Categorize the threats. List the countermeasures you would deploy to protect your RSNI center against the possible cyber-security threats. Match the most important IT Asset you have cyber-security threats and countermeasures for your RSNI center. Simply write three sections for the most important IT Asset in your RSNI center; The name of the IT Asset in your center,…Create an Entity Relationship Diagram for the following narrative. BlueStar Sdn. Bhd. (BSSB), based in Kuala Lumpur provides a professional range of event management services. One of the services is organizing and producing live concerts. BSSB will be organizing a big concert of a popular Malaysian artist, Dato' Sri Siti Nurhaliza. The concert namely “Dato' Sri Siti Nurhaliza On Tour” will take place on 16th January 2021, 8pm at Axiata Arena Bukit Jalil. Ticket price are tiered accordingly at several categories which are VIP Zone (numbered seating), Lower Zone (numbered seating) and Upper Zone (free seating). Each person has to have a valid ticket to enter the concert venue (assume one person is allowed to purchase only one ticket) and children of age 3 and below is strictly prohibited.Dunkin’ Donuts has a strong following of customers around the world who rely on the restaurantchain’ s coffee, donuts, and other baked goods to get their day started. Established in 1950, Dunkin’ Donutsstill uses the original proprietary coffee blend recipe created by its founder William Rosenburg, but whatstarted as a small donut shop in Quincy, Massachusetts, has grown into a global business generating morethan $800 million in revenue in 2015. And as the restaurant chain has grown, its business operations havebecome increasingly sophisticated.Today, Dunkin’ Donuts franchises are backed up by complex supply chain managed by NationalDCP (NDCP) the exclusive supply chain management cooperative for more than 8,900 Dunkin’ Donutsstores in the United States an 51 other countries. Founded as a membership cooperative I 2012 with themerger of five regional food and beverage operating companies, NDCP’ s mission is to support the dailyoperations of Dunkin’ Donuts franchisees and facilitate…
- Leah Jones is the IT manager at Rock Solid Outfitters, a medium-sized supplier of outdoor climbing and camping gear. Steve Allen, the marketing director, has asked Leah to develop a special web-based promotion. As Steve described it to Leah, Rock Solid will provide free shipping for any customer who either completes an online survey form or signs up for the Rock Solid online newsletter. Additionally, if a customer completes the survey and signs up for the newsletter, Rock Solid will provide a $10 merchandise credit for orders of $100 or more. Leah has asked you to develop a decision table that will reflect the promotional rules that a programmer will use. She wants you to show all possibilities, and then to simplify the results to eliminate any combinations that would be unrealistic or redundant.What are some of the first things that come to mind whenever you hear the term "email"? When an email is sent, what happens to it after it has been delivered? Create a list of everything you know now that you didn't know before. It would pique my interest to see if anybody has any insight into the factors that led to these disparities. Does the amount of complexity vary from model to model within your company?Adwapa is the head of Casa Financial Services which provides financial services to the people of Ghana and outside Ghana. In 2017, when the company was incorporated, Adwapa hired the services of two IT personnel who designed a web page for Casa Financial Services. One year after the web page was launched, Adwapa noticed that the expected revenue increment with the launching of the web page has not been achieved. When the IT personnel designed the webpage, they stated all the financial services provided by Casa Financial Services in text. Adwapa is worried because the feedback they get from clients who use the webpage is not encouraging. They complain the page is boring. Adwapa has recently recruited three graduates from the University of Professional Studies, Accra (UPSA). She has tasked them to identify the problem with the webpage and come out with the best solution to help Casa Financial Services achieve its revenue increment objective. Adwapa has promised that the person who…
- You have been asked to carry out use case modelling to identify the functional requirements for a new fitness watch targeted at swimmers, similar to those produced by Garmin or Polar. The target user is anyone from a recreational to a competitive swimmer, and both open water and swimming pool laps are to be catered for. The watch is to connect with an app that will provide a variety of additional features as well as those on the watch itself. Use the user goal technique to identify all the use cases that would be relevant to a swimmer who would be a potential user of the watch. Use your own experience, or that of a swimmer of your acquaintance, together with any research you need to do. (a) Present your list in a table giving the use case name and an informative brief description. (b) Draw a use case diagram representing the same information.DRAW a detailes high-level “as-is” process diagram depicting how a company could have complied a combined sales report BEFORE the Metro-E system was introduced (i.e. before no connectivity existed among the sites)The store has 12 locations. Show how the sales for each day would be collected , show how it would be stored , show the possibilities of not getting any sale , show how it will be sent to the central office , show hw the sales report would be generated.Your company is planning to launch its own Medical Solution System to facilitate the citizens of country by providing a platform to get solutions related to health and medicine. Keeping in mind the current situation of Covid-19 the idea is to automate process of OPDs and Consultations using this platform. Stakeholders that are Doctors, hospitals, patients and pharmacies are to be on board for the success of planned system. Draw an Activity diagram to elaborate the flow of activities with respect to each entity.
- You seem to think that the process of developing a network that spans the whole firm was challenging. Using generalizations, please describe the issues at hand and provide some possible solutions.Answer this: when you hear the word "email," what are some of the first things that spring to mind? What happens to an email after it has been delivered? Make a note of all the information you've learned that wasn't available to you previously. It would be fascinating to learn if anybody has theories on what could be causing these discrepancies. Does your company's models differ in complexity?The Sarhad University LMS needs certain requirements gathered, but how would you go about doing that using the provided requirement elicitation techniques? To access the LMS Portal, click here.Three methods are presented: (1) Interviews, (2) Surveys, and (3) Observations.